Sciweavers

2747 search results - page 105 / 550
» Network externalities in software systems
Sort
View
RAID
2009
Springer
14 years 3 months ago
Automatically Adapting a Trained Anomaly Detector to Software Patches
Abstract. In order to detect a compromise of a running process based on it deviating from its program’s normal system-call behavior, an anomaly detector must first be trained wi...
Peng Li, Debin Gao, Michael K. Reiter
EAAI
2010
144views more  EAAI 2010»
13 years 3 months ago
Fault diagnosis of industrial systems by conditional Gaussian network including a distance rejection criterion
The purpose of this article is to present a method for industrial process diagnosis with Bayesian network, and more particularly with Conditional Gaussian Network (CGN). The inter...
Sylvain Verron, Teodor Tiplica, Abdessamad Kobi
ISADS
2003
IEEE
14 years 2 months ago
A GUI Approach to Programming of TMO Frames and Design of Real-Time Distributed Computing Software
An advanced high-level approach for programming of real-time distributed computing applications, the TMO (Time-triggered Message-triggered Object) programming and specification sc...
K. H. Kim, Seok-Joong Kang
ICSE
2000
IEEE-ACM
14 years 16 days ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
INFORMATICALT
2002
107views more  INFORMATICALT 2002»
13 years 8 months ago
Comparative Analysis of the Graphical Result Presentation in the SOM Software
In the paper, we analyze the software that realizes the self-organizing maps: SOM-PAK, SOM-TOOLBOX, Viscovery SOMine, Nenet, and two academic systems. Most of the software may be f...
Gintautas Dzemyda, Olga Kurasova